Zobrazeno 1 - 10
of 36
pro vyhledávání: '"Fang Chun Yang"'
Publikováno v:
Tongxin xuebao, Vol 35, Pp 49-56 (2014)
Aiming to solve the distributed BPEL engine placing problem in cloud, a K-means based distributed BPEL en-gine placing algorithm was proposed. The algorithm transforms the BPEL engine placing model into some optimization model in mathematics, and the
Externí odkaz:
https://doaj.org/article/83933070052c454ba46e8c91e86e1a11
Publikováno v:
Tongxin xuebao, Vol 35, Pp 108-117 (2014)
Data security is the major challenge for WSN applications. It's significant in theory and practice to detect and filter false data effectively. Traditional approaches based on symmetric key, public key or polynomial always need large cost in transmis
Externí odkaz:
https://doaj.org/article/431053f2fecf45ab9ff11b1b70f16f42
Publikováno v:
Tongxin xuebao, Vol 35, Pp 63-69 (2014)
According to the characteristic of qualitative and quantitative uncertainty conversion ability of cloud model, a lightweight cloud model was designed, and the uncertainty representation of direct trust, indirect trust, and recommenda-tion trust in WS
Externí odkaz:
https://doaj.org/article/ff6924da6faa4d78bb67ac25b7ed12d2
Publikováno v:
Tongxin xuebao, Vol 34, Pp 133-141 (2013)
In Internet of Vehicles (IoVs), the frequent interruptions of wireless links between the vehicles cause data retrans-mission, which makes the whole vehicle network performance fall sharply. Hence, a multipath routing algorithm was pro-posed for enhan
Externí odkaz:
https://doaj.org/article/c54a0abb6e85442c86cebe7455e04008
Publikováno v:
Tongxin xuebao, Vol 34, Pp 34-41 (2013)
Vehicles need vertical handoffs in the heterogeneous wireless network environment of IoV, but current vertical switching technologies generally cannot support vertical handoff among WAVE, WiMAX and 3G cellular. In order to overcome this problem, a ve
Externí odkaz:
https://doaj.org/article/ef3327cea3164872bccaf3b523e0e726
Publikováno v:
Tongxin xuebao, Vol 34, Pp 176-183 (2013)
A neighbor selection algorithm was proposed which was composed of sub-algorithms of peer selection and chunk selection.The peer selection algorithm assured that the peers could find the neighbors providing the video data at a high probability.The chu
Externí odkaz:
https://doaj.org/article/3748b4241b4247cc9f745d39ae4e7a61
Publikováno v:
Tongxin xuebao, Vol 33, Pp 143-150 (2012)
By using of the features of DCT coefficients in frequency domain and the correlation of the predictive mode in spatial domain,the proposed algorithm evaluated the complexity of encoding block and selected encoding block size firstly,computed the text
Externí odkaz:
https://doaj.org/article/2b9c0b9079b74b7a8a1aecd593640a51
Publikováno v:
Advanced Materials Research. :1088-1095
The paper proposed a Wireless Sensor Network (WSN)’s Sybil node discovery method based on groups relative location information. By setting the distributed algorithm of node group, the relative locations of each node with its surrounding and interac
Publikováno v:
Advanced Materials Research. :2372-2379
Since the nodes of WSNs are always deployed on the outside, nodes are easy to be captured. The traditional detection approaches of capture attack can be categorized as approaches based on time of absence and approaches based on target tracking. The f
Publikováno v:
Advanced Materials Research. :905-912
As a typical application of Internet of Things (IoT), the issue of protecting security of WSN will be an important problem effecting the expansion of IoT. Since the nodes of WSN are always arranged in an open environment, they are easy to be captured